Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.
Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.
9/11 [activist] and investigative journalist Michael Ruppert has reportedly committed suicide. The 63-year-old former narcotics investigator with the LAPD shot himself after his radio show, according to an announcement by author Carolyn Baker who was a guest on his final broadcast on [April 13]. Mr Ruppert was famous for his litany of conspiracy theories which encompassed the CIA to drugs, international politics, the oil industry, Wall Street and 9/11. On her Facebook page, Ms Baker wrote: 'This was not a ''fake'' suicide. It was very well planned by Mike who gave us few clues but elaborate instructions for how to proceed without him.' After leaving the LAPD, Mr Ruppert started a website From The Wilderness which claimed to expose government corruption. It included his claims that he had seen drug-dealing at the CIA. Mr Ruppert gained notoriety by confronting then-CIA Director John Deutch during a meeting in 1995 and telling him that he had seen CIA officers involved in drug-dealing. He later claimed on his website that the CIA and American government was involved in 9/11. In 2004, he published Crossing the Rubicon: The Decline of the American Empire at the End of the Age of Oil. The book alleged that former VP Dick Cheney had conspired with Wall Street and other government officials over the September 11 World Trade Center attacks. In 2009, he starred in a documentary called Collapse where he spoke about his theories involving the demise of mankind following the economic and energy crises.
Note: Mike Ruppert was a great hero who courageously reported reliable information the mainstream media would not touch. For a five-minute video of his public testimony on CIA drug running, click here. For a 10-minute video showing his great despair about the condition of the world, click here. Thank you, Mike, for opening the eyes of so many to the deeper realities in our world. Another courageous hero of the 9/11 movement, John Judge, also died, from complications of a stroke, on April 15. For more on his great work, click here. For a great 8-minute video of his revealing powerful information you may not know, click here.
From 1960 to 1965, the CIA brainstormed at least eight plots to assassinate Cuba's Fidel Castro. According to a report prepared in 1967 and declassified 36 years later, the CIA thought of using cigars, contaminated air, poisoned pills, fungus and a poison-filled syringe to take out the Communist leader. One plot, which sought only to damage Castro's image, suggested placing thallium salt in his shoes, in the hope that his beard would fall out. But one idea stood out above the rest: the plan to kill Castro with a booby-trapped seashell. You see, the dictator was a fan of skin diving, so intelligence agents plotted to place an especially spectacular shell in a reef Castro was known to frequent. The hope was that the shell would be so beautiful that Castro would pick it up and, by doing so, trigger an explosive. Desmond Fitzgerald, the CIA's head of Cuban operations, went as far as to buy two books on Caribbean mollusks. But the elaborate scheme was deemed impractical.
Note: For more on assassinations as a tool of government policy, see the deeply revealing reports from reliable major media sources available here.
The FBI’s transformation from a crime-fighting agency to a counterterrorism organization in the wake of the Sept. 11, 2001, attacks has been well documented. Less widely known has been the bureau’s role in secret operations against al-Qaeda and its affiliates in Iraq and Afghanistan, among other locations around the world. With the war in Afghanistan ending, FBI officials have become more willing to discuss a little-known alliance between the bureau and the Joint Special Operations Command (JSOC) that allowed agents to participate in hundreds of raids in Iraq and Afghanistan. The relationship benefited both sides. JSOC used the FBI’s expertise in exploiting digital media and other materials to locate insurgents and detect plots, including any against the United States. The bureau’s agents, in turn, could preserve evidence and maintain a chain of custody should any suspect be transferred to the United States for trial. In early 2003, two senior FBI counterterrorism officials traveled to Afghanistan to meet with the Joint Special Operations Command’s deputy commander at Bagram air base. The pace of activity in Afghanistan was slow at first. An FBI official said there was less than a handful of [Hostage and Rescue Team] deployments to Afghanistan in those early months; the units primarily worked with the SEALs as they hunted top al-Qaeda targets. The tempo quickened with the U.S.-led invasion of Iraq in 2003. At first, the HRT’s mission was mainly to protect other FBI agents when they left the Green Zone, former FBI officials said. In 2005, all of the HRT members in Iraq began to work under JSOC.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Last week, Stanford University and New York University released a major study about the use of drones in the ever-evolving but never-ending war on terror. Drones are terrorizing an entire civilian population. [We] spent weeks in Pakistan interviewing more than 60 people from North Waziristan. Many were survivors of strikes. Others had lost loved ones and family members. All of them live under the constant threat of annihilation. What my colleagues and I learned from these unnamed and unknown victims of America's drone warfare gave the report its title: "Living Under Drones." Drones are a constant presence in the skies above the North Waziristan tribal area in Pakistan, with as many as six hovering over villages at any one time. People hear them day and night. They are an inescapable presence, the looming specter of death from above. And that presence is steadily destroying a community twice the size of Rhode Island. The routines of daily life have been ripped to shreds. Indisputably innocent people cower in their homes, afraid to assemble on the streets. "Double taps," or secondary strikes on the same target, have stopped residents from aiding those who have been injured. A leading humanitarian agency now delays assistance by an astonishing six hours. What makes this situation even worse is that no one can tell people in these communities what they can do to make themselves safe. No one knows who is on the American kill list, no one knows how they got there and no one knows what they can do to get themselves off. It's all terrifyingly random. Suddenly, and without warning, a missile launches and obliterates everyone within a 16-yard radius.
Note: The author of this report, Jennifer Gibson, is a staff attorney with Reprieve, a London-based legal charity that represents dozens of Pakistani drone victims. For an excellent, seven-minute video by professors exploring the tragic reality of drone strikes in Pakistan, click here. For the "Living Under Drones" website where you can read a summary and download this report by Stanford University and the New York Times, click here. To learn about a beautiful movement to place large photos of children's faces in target areas to stop drone operators from killing innocents, click here.
At the height of the Cold War, the CIA conducted covert, illegal scientific research on human subjects. Known as Project MK-ULTRA, the program subjected humans to experiments with drugs such as LSD and barbiturates, hypnosis and (some reports indicate) radiological and biological agents. In 1973, CIA Director Richard Helms ordered all documents from Project MK-ULTRA destroyed. Nevertheless, late the following year, the New York Times reported on the illegal activities. In 1975, the Church Committee, headed by Senator Frank Church, and a commission headed by Vice President Nelson Rockefeller investigated the project. They found that over more than two decades, the CIA spent nearly $20 million, enlisted the services of researchers at more than 30 universities and conducted experiments on subjects without their knowledge. Some of the research was performed in Canada. Some historians argue that the goal of the program was to create a mind-control system by which the CIA could program people to conduct assassinations. In 1953, Richard Condon dramatized the idea in the thriller The Manchurian Candidate, which was adapted into a film starring Frank Sinatra. Such ultimately wacky ideas were also dramatized in the recent George Clooney film The Men Who Stare at Goats.
Note: For more on CIA mind control experiments, see the extensive documentation available here.
Secret documents newly disclosed by the German news magazine Der Spiegel ... shed more light on how aggressively the National Security Agency and its British counterpart have targeted Germany for surveillance. A series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden ... reveal that the NSA appears to have included Merkel in a surveillance database alongside more than 100 other foreign leaders. The documents also confirm for the first time that, in March 2013, the NSA obtained a top-secret court order against Germany as part of U.S. government efforts to monitor communications related to the country. [A] document, dated 2009, indicates that Merkel was targeted in a broader NSA surveillance effort. She appears to have been placed in the NSA’s so-called “Target Knowledge Base“ (TKB), which Der Spiegel described as the central agency database of individual targets. An internal NSA description states that employees can use it to analyze “complete profiles“ of targeted people. But the NSA’s surveillance of Germany has extended far beyond its leader. A separate document from the NSA’s Special Source Operations unit ... shows that the Obama administration obtained a top-secret court order specifically permitting it to monitor communications related to Germany. Special Source Operations is the NSA department that manages what the agency describes as its “corporate partnerships” with major US companies, including AT&T, Verizon, Microsoft, and Google.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
US intelligence chiefs have confirmed that the National Security Agency has [performed] warrantless searches on Americans’ communications. The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases. Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons”. The legal authority to perform the searches, revealed in top-secret NSA documents provided ... by Edward Snowden, was denounced by Wyden as a “backdoor search loophole.” Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program – a huge network of internet cable taps. Confirmation that the NSA has searched for Americans’ communications in its phone call and email databases complicates President Barack Obama’s initial defenses of the broad surveillance in June. Wyden and Udall [said] “Today’s admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through ... the communications of individual Americans."
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The Obama administration on [April 3] defended its creation of a Twitter-like Cuban communications network [called ZunZuneo] to undermine the Communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval. But two senior Democrats on congressional intelligence and judiciary committees said they had known nothing about the effort. An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform. First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent. Yet its users were neither aware it was created by [USAID, the U.S. Agency for International Development] with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes. Josefina Vidal, director of U.S. affairs at Cuba's Foreign Ministry, said ... that the ZunZuneo program "shows once again that the United States government has not renounced its plans of subversion against Cuba, which have as their aim the creation of situations of destabilization in our country to create changes in the public order and toward which it continues to devote multimillion-dollar budgets each year."
Note: If any other country did this to the U.S., how do you think the U.S. government would respond?
Three days after an FBI agent was cleared of wrongdoing in the bizarre killing of an associate of slain Boston bombing suspect Tamerlan Tsarnaev, lawyers for Dzhokhar Tsarnaev, the only surviving bombing suspect, alleged that the FBI attempted to recruit the elder Tsarnaev as an informant. Dzhokhar Tsarnaev’s defense team said that new information suggests the FBI interviewed Tamerlan on several occasions before the attack, and even pressured him to surreptitiously report on the Chechen underworld. The Bureau has continued to emphatically state that it didn’t know the identities of the two suspected bombers until they were fingerprinted, and have denied any involvement with the brothers aside from following up on a tip from a Russian emissary that the elder Tsarnaev may have been seeking jihad. In the case of Ibragim Todashev, who allegedly took part with Tamerlan in a robbery turned triple-homicide in Waltham, in 2011, family members have also stated that FBI pressure may have pushed the 20-something ethnic Chechen and mixed martial arts fighter to the brink of violence. Since the terrorist attacks of 9/11, the Bureau has stepped up surveillance of specific racial, ethnic and religious communities, including the use of informants. The tactics have ... left the Bureau open to charges of entrapment, not to mention assorted Internet conspiracy theories. Part of those post-9/11 tactics are the use of “voluntary interviews … often encouraging interviewees to serve as informants in their communities,” writes the American Civil Liberties Union.
Note: Why didn't the FBI reveal its attempt to recruit the elder Tsarnaev when the bombing happened? Something is quite fishy here.
A Senate intelligence committee investigation found that the Central Intelligence Agency employed brutal interrogation methods that turned out to be largely useless and then lied about their effectiveness. The Senate report contradicts the main defenses of the Bush-era torture program: That harsh methods were needed to produce "actionable results," and that the program itself helped save American lives by foiling terror attacks. Instead, the CIA overstated the effectiveness of the program and concealed the harshness of the methods they used. Intelligence breakthroughs credited to the “enhanced interrogation” program by the CIA were instead gleaned through other means, and then used by the agency to bolster defenses of the program. Conservative media figures incessantly hyped former Bush administration officials’ at times verifiably false claims about the efficacy of the program. The Bush administration’s trip to the “dark side” provided pundits, op-ed columnists, and other media personalities an endless stream of satisfaction from talking like the greased up protagonists of 1980s action films.
Note: For an article explaining how even though this report may be declassified, the public will not have access to most of it, click here. For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
In mid-February, [reporter Matt] Taibbi announced he was leaving Rolling Stone, where he has worked for almost a decade, to start a digital magazine for First Look Media, the company owned by eBay billionaire Pierre Omidyar. The last few weeks have been consumed with business matters—hiring editorial staff, signing off on designs. Taibbi won’t discuss the exact format of the new venture, nor its name—that’s still being worked out, too—but he sees it focusing, in part, on the same matters of corporate malfeasance he’s been covering for years. What people expect, of course, is the ribald, loudly antagonistic voice of a writer who is, in his own words, “full of outrage.” The guy who compared Goldman Sachs to a “vampire squid wrapped around the face of humanity, relentlessly jamming its blood funnel into anything that smells like money.” None of Taibbi’s anger at the “toothlessness” of the media has dissipated. Taibbi says his decision to leave Rolling Stone was predicated in part on ... his desire to “be on Glenn’s side.” Glenn being Glenn Greenwald, who, along with Laura Poitras and Jeremy Scahill, is currently editing another First Look property, the national-security-centric The Intercept, which has been live since February. “Glenn’s in this position of being a reporter trying to put out material that came from a whistle-blower, and now they’re both essentially in exile. It’s crazy. If the press corps that existed in the ’60s and ’70s had seen this situation, they’d be rising as one and denouncing the government for it,” Taibbi says.
Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.
Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.
Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.
Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
The US came under sharp criticism at the UN human rights committee in Geneva on [March 13] for a long list of human rights abuses that included everything from detention without charge at Guantánamo, drone strikes and NSA surveillance, to the death penalty, rampant gun violence and endemic racial inequality. The experts raised questions about the National Security Agency’s surveillance of digital communications in the wake of Edward Snowden’s revelations. The committee’s 18 experts [are] charged with upholding the International Covenant on Civil and Political Rights (ICCPR), a UN treaty that the US ratified in 1992. The US came under sustained criticism for its global counter-terrorism tactics, including the use of unmanned drones to kill al-Qaida suspects, and its transfer of detainees to third countries that might practice torture, such as Algeria. Committee members also highlighted the Obama administration’s failure to prosecute any of the officials responsible for permitting waterboarding and other “enhanced interrogation” techniques under the previous administration. Walter Kälin, a Swiss international human rights lawyer who sits on the committee, attacked the US government’s refusal to recognise the convention’s mandate over its actions beyond its own borders. The US has asserted since 1995 that the ICCPR does not apply to US actions beyond its borders - and has used that “extra-territoriality” claim to justify its actions in Guantánamo and in conflict zones.
Note: How sad that it appears this news was not reported in any major US media.
The controversy surrounding Adolf Hitler's skull fragments is a little embarrassing for the Russian secret services. In 2000 they presented a skull fragment and a piece of jawbone that they claimed were the remains of the Nazi leader. It was an attempt to quash outlandish rumors that he had escaped alive at the end of World War II. But in October US researchers presented the results of DNA tests on the skull and said it definitely didn't belong to the dictator because it was from a female. Scientists had already harbored doubts about the authenticity of the piece of bone because it was thinner than a male's usually is. "The bone seemed very thin -- male bone tends to be more robust. It corresponds to a woman between the ages of 20 and 40," said Nick Bellantoni of the University of Connecticut. The position of the exit wound at the back of the skull also made scientists suspicious because eyewitnesses said Hitler had committed suicide by firing into his right temple. Bellantoni said he was allowed to work on the skull for an hour. When he flew home from Moscow he had two samples in his luggage: a sample from the skull fragment and one sample of blood from the sofa on which Hitler is said to have shot himself. Bellantoni was able to compare the bloodstains on the blood-stained fabric with photos the Soviets took after they seized Hitler's bunker in Berlin. The stains had matched those in the photos. The research showed that the sofa blood DNA did not match the skull DNA. The sofa blood was male and the skull belonged to a woman, claimed Bellantoni.
Note: For more on the mysteries surrounding the end of Hitler's life, click here.
Malaysia's prime minister says the disappearance of Malaysia Airlines Flight 370 appears to be "deliberate." The latest evidence suggests the plane didn't experience a catastrophic incident over the South China Sea as was initially suspected. Prime Minister Najib Razak said the investigation has refocused onto the crew and passengers aboard the missing plane. He added that ... all possibilities are still being investigated. A Malaysian government official who is involved in the investigation said investigators have concluded that one of the pilots or someone else with flying experience hijacked the missing Malaysia Airlines jet. The official said that hijacking was no longer a theory. "It is conclusive." A Malaysian official, who also declined to be identified because he is not authorized to brief the media, said only a skilled aviator could navigate the plane the way it was flown after its last confirmed location over the South China Sea. The official said it had been established with a "more than 50 percent" degree of certainty that military radar had picked up the missing plane after it dropped off civilian radar. Malaysian officials have said radar data suggest it may have turned back and crossed back over the Malaysian peninsula westward, after setting out toward the Chinese capital. The flight altered its course more than once after it lost contact with ground control and that it made significant changes in altitude. Investigators say there's further evidence suggesting the jet did not crash immediately after being lost on radar; a transmitter on the plane tried for another four hours to ping satellites.
Note: Why is the military radar 50% certain? How could a transmitter on the plane ping for four hours, yet no one on the plane made a phone call? Remember that after Flight 93 was hijacked on 9/11, many phone calls were made by passengers on the plane. There is an abundance of high strangeness to this airplane's disappearance. For valuable speculation on the missing flight not well covered in the major media, click here. For some very unusual radar evidence of its disappearance, click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.